<

[Product update] Infrastructure Analysis Tool is now available with Business Accounts.Learn More

x

Phishing

Published on
8,070 Points
2,070 Views
Last Modified:
Approved
Phishing is one of the trendiest information security related buzzwords, so what is it ?

Well, basically phishing can be explained as tricking a user to believe they are at a certain web-site when they're really at a bogus site or sending a forged email causing the user to believe the same.

The purpose of phishing can be summed up as an illegitimate technique to steal confidential information such as login credentials, passwords, passcodes, personal details, etc.

Phishing is just another spin on social engineering, think about it...

The way's phishing attacks are carried out are numerous and so we will only cover some of them, please remember this is not intended to be a tutorial so specific tools and methods are not provided here.

Web site phishing attacks can be integrated with forged phishing emails, the from address can be faked to appear from the legitimate web site such as bank, boss, etc.. and can request the user to perform certain actions such as change the password using the provided link, login, contact someone,
if contacted then...  and more.

A lot of these emails also mask the link "in plain sight" by bluffing the user showing a bogus address which forwards to an IP address; e.g. user see's www.google.com but if they click on the link they will reach www.kalman.co.il; this is done using simple mail and HTML manipulation methods.

Other methods include forwarding similarly named domain names to the bogus site, e.g. www.googel.com, hacking into DNS server's, hacking the computers hosts file (a file which acts as the operating systems simple own DNS server) and of course - malware.

Malware (which includes spyware, grayware, etc...) may gather information on the user including passwords, etc..

And may forge web sites - since most users are local administrators of their pc's they don't usually restrict the software or know how to be cautious.

What to do - well, it's difficult to be protected unless you're an IT professional as no software product will provide you with 100 % protection or even 90 %.

The best option is - as in most topics in information security - have layered security which should include:

Anti virus, updated operating system, Firefox (more secure then some of the other browsers available in the market), and of course - know your enemy!

When in doubt - don't trust! Why would your system administrator ask you to help him troubleshoot a network issue ?! That's why he has his own staff!!

If he needs your password - either meet face-to-face or just ask him to reset it, use it and when done let you change it to something you want.

Google, Yahoo, eBay, Amazon will NEVER ask you to provide them your password, trust me.

Got an email you're not sure about ?! Forward it to the company using email/fax (just make sure you didn't get the email/fax via the email you're checking).

Browsing to a website via a link in the email ?! Check the browser address bar and make sure the address belongs to the site you want to visit - again, when in doubt... STOP! VERIFY!
0
Comment
Author:kaerez
0 Comments

Featured Post

Defend Against the Q2 Top Security Threats

Were you aware that overall malware worldwide was down a surprising 42% from Q1'18? Every quarter, the WatchGuard Threat Lab releases an Internet Security Report that analyzes the top threat trends impacting companies worldwide. Learn more by viewing our on-demand webinar today!

Join & Write a Comment

Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

Keep in touch with Experts Exchange

Tech news and trends delivered to your inbox every month